Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 02:31
Static task
static1
Behavioral task
behavioral1
Sample
e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe
-
Size
540KB
-
MD5
e1880c02d31c7c2516de453d9a2b65c8
-
SHA1
446f8e6641f7506956b3911a1bd4baab5ac2b494
-
SHA256
d9c346f01f30a157082337c42002739eed034cfac31e5cd506c3e035030b6125
-
SHA512
47aca2cd91620bc4b06e03a9521480f28182dc76a9cfe4a00326cfc6a6c5f550fffbe0814cb3c7786f5ec5466e09dcc90fc310a582d83ec586a31ca2f082fa3f
-
SSDEEP
6144:ep3L2QXYf/A90xnOXmXDAfQ/FIN8NhwtXj3HiIWJrGlF:z4Yn5xnOXoG+FIYmHu8lF
Malware Config
Extracted
emotet
Epoch3
190.16.101.10:80
190.217.1.149:80
45.56.122.75:80
85.25.92.96:8080
94.177.253.126:80
187.188.166.192:80
192.241.220.183:8080
189.132.130.111:8080
186.109.91.136:80
186.92.11.143:8080
203.99.182.135:443
91.109.5.28:8080
70.32.94.58:8080
70.45.30.28:80
203.99.187.137:443
190.228.212.165:50000
51.38.134.203:8080
203.99.188.11:443
184.82.233.15:80
154.120.227.206:8080
157.7.164.178:8081
190.13.146.47:443
186.146.110.108:8080
162.241.134.130:8080
75.154.163.1:8090
201.217.113.58:8080
178.249.187.150:7080
190.117.206.153:443
152.170.220.95:80
187.143.219.242:8080
144.76.62.10:8080
143.95.101.72:8080
200.55.168.82:20
138.186.179.235:8080
203.99.188.203:990
200.90.86.170:8080
186.84.173.153:80
95.216.207.86:7080
216.70.88.55:8080
212.112.113.235:80
181.61.143.177:80
216.75.37.196:8080
5.189.148.98:8080
187.154.175.124:8080
190.96.118.15:443
113.52.135.33:7080
181.197.2.80:443
190.113.146.128:8080
201.196.15.79:990
83.169.33.157:8080
181.36.42.205:443
176.58.93.123:80
23.253.207.142:8080
138.197.140.163:8080
181.47.235.26:993
185.45.24.254:7080
172.104.70.207:8080
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat chunkeriell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chunkeriell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chunkeriell.exe -
Modifies data under HKEY_USERS 25 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" chunkeriell.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 chunkeriell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad chunkeriell.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{536B7BCF-6305-456A-A198-95EC448D4E15} chunkeriell.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\aa-b2-04-5b-3b-03\WpadDetectedUrl chunkeriell.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" chunkeriell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings chunkeriell.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{536B7BCF-6305-456A-A198-95EC448D4E15}\WpadDecisionReason = "1" chunkeriell.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 chunkeriell.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix chunkeriell.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{536B7BCF-6305-456A-A198-95EC448D4E15}\aa-b2-04-5b-3b-03 chunkeriell.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00c3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 chunkeriell.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{536B7BCF-6305-456A-A198-95EC448D4E15}\WpadDecisionTime = f03489ba1707db01 chunkeriell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections chunkeriell.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" chunkeriell.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\aa-b2-04-5b-3b-03 chunkeriell.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\aa-b2-04-5b-3b-03\WpadDecisionTime = 300fb8801707db01 chunkeriell.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\aa-b2-04-5b-3b-03\WpadDecisionReason = "1" chunkeriell.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\aa-b2-04-5b-3b-03\WpadDecision = "0" chunkeriell.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\aa-b2-04-5b-3b-03\WpadDecisionTime = f03489ba1707db01 chunkeriell.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{536B7BCF-6305-456A-A198-95EC448D4E15}\WpadDecision = "0" chunkeriell.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{536B7BCF-6305-456A-A198-95EC448D4E15}\WpadNetworkName = "Network 3" chunkeriell.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00c3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 chunkeriell.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{536B7BCF-6305-456A-A198-95EC448D4E15}\WpadDecisionTime = 300fb8801707db01 chunkeriell.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings chunkeriell.exe -
Modifies registry class 36 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mfccalc.calculator\ = "mfccalc.calculator" e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mfccalc.calculator\CLSID e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\InprocHandler32\ = "ole32.dll" e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\ProgID chunkeriell.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\InprocHandler32 e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\InprocHandler32\ = "ole32.dll" e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mfccalc.calculator\CLSID\ = "{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}" chunkeriell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\ProgID\ = "mfccalc.calculator" chunkeriell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\ = "mfccalc.calculator" e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\ProgID e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\InprocHandler32 e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mfccalc.calculator\CLSID\ = "{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}" chunkeriell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\InprocHandler32\ = "ole32.dll" chunkeriell.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\InprocHandler32 chunkeriell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\InprocHandler32\ = "ole32.dll" chunkeriell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mfccalc.calculator\CLSID\ = "{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}" e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mfccalc.calculator\CLSID e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7} e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mfccalc.calculator\CLSID chunkeriell.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\LocalServer32 chunkeriell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\LocalServer32\ = "C:\\Windows\\SysWOW64\\CHUNKE~1.EXE" chunkeriell.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\LocalServer32 e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\ProgID\ = "mfccalc.calculator" e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\LocalServer32 e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\ProgID\ = "mfccalc.calculator" chunkeriell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\LocalServer32\ = "C:\\Windows\\SysWOW64\\CHUNKE~1.EXE" chunkeriell.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mfccalc.calculator e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\ProgID\ = "mfccalc.calculator" e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mfccalc.calculator\CLSID\ = "{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}" e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\E1880C~1.EXE" e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\ProgID chunkeriell.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mfccalc.calculator\CLSID chunkeriell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\E1880C~1.EXE" e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\ProgID e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\InprocHandler32 chunkeriell.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\LocalServer32 chunkeriell.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3032 chunkeriell.exe 3032 chunkeriell.exe 3032 chunkeriell.exe 3032 chunkeriell.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2800 e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1320 e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe 1320 e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe 2800 e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe 2800 e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe 2580 chunkeriell.exe 2580 chunkeriell.exe 3032 chunkeriell.exe 3032 chunkeriell.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1320 wrote to memory of 2800 1320 e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe 30 PID 1320 wrote to memory of 2800 1320 e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe 30 PID 1320 wrote to memory of 2800 1320 e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe 30 PID 1320 wrote to memory of 2800 1320 e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe 30 PID 2580 wrote to memory of 3032 2580 chunkeriell.exe 32 PID 2580 wrote to memory of 3032 2580 chunkeriell.exe 32 PID 2580 wrote to memory of 3032 2580 chunkeriell.exe 32 PID 2580 wrote to memory of 3032 2580 chunkeriell.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe--448709e12⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:2800
-
-
C:\Windows\SysWOW64\chunkeriell.exe"C:\Windows\SysWOW64\chunkeriell.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\chunkeriell.exe--c903932c2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Crypto\RSA\S-1-5-18\6d14e4b1d8ca773bab785d1be032546e_4d69f9e1-559c-46cf-82ac-67913db47c55
Filesize1KB
MD56e611c93a7a6ab690d0c1ce2ccab4d05
SHA1462a3edd8819d0e9c76b8baac959294feaaa7f8b
SHA2568316034566b5d1c8b4d7d20bc62b1fac30f54647c303908cbe99201662209fe6
SHA5125dabe810571010cd5dc5a9116a8cacf5f756b840eb1d28c971d9d0048b1da7219116ccfc0072bd56faf8062e50e6e2cbedb5e2546a583e8c756c3dae1b2cbc7d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2872745919-2748461613-2989606286-1000\0f5007522459c86e95ffcc62f32308f1_4d69f9e1-559c-46cf-82ac-67913db47c55
Filesize1KB
MD529cb7b89ab8d17c76944a654d1688578
SHA1891a1d7413a7fc6de3384fa0d5fd9558560a9954
SHA25604877e1eeb4ea199c6c6429bd42f094c505b629774c088793a8cc13ce087ebc0
SHA512a5b689efa1680b7335f47fb59b69f2ac3c9910eb6410feeb65bd4e21220af964845790349fafc125e3b2a74710af0aeba0581e63c812c1d8663b712563d70451